7 Reasons OEMs Are Adopting Security by Design Early in the Product Development Life Cycle

In today’s world, every CEO, CIO, CSO, or CFO is liable for compliance and failing “Pen Testing” (penetration testing) scores, not to mention rising insurance premiums. The pressure of thwarting the increasing security breaches and hacks demand a robust solution that lowers costs and increases network security without navigating complex solutions from multiple vendors.   So what is the value proposition of adding security to an OEM’s device early in the product life cycle?    “If you were just offering a communications device before, you could be looking at increased network security through the same lens as everyone else,” said Michael Tate, chief operating officer and senior vice president of global sales and marketing for FreeWave. He adds, “The outcomes transform commodity-priced hardware into a differentiated solution.”    “Today you are selling hardware and tomorrow you are selling a valuable solution with ARR, all while becoming more relevant to your customer and solving real security problems over just connectivity. If you have devices that give you security and also include communications, you’re going to win faster.” “If you have devices that give you security and also include communications, you’re going to win faster.” – Michael Tate, chief operating officer and senior vice president of global sales and marketing for FreeWave For OEMs, proactive threat detection starts with zero trust. Zero trust ensures every interaction is verified and that OEM products are trustworthy.  OEMs and Preparing for the Future The importance of cybersecurity extends to our readiness as a nation. Thousands of OEMs contribute to the U.S. defense industrial supply chain across 16 critical infrastructure sectors. According to the U.S. Department of Defense Cybersecurity Strategy, the first of its kind in the country’s history, ensuring our safety means having “a cybersecurity framework built upon zero trust principles.”  As a network is continuously monitored, a zero trust security approach gives systems administrators time to focus on highest-risk items and stay ahead of threats. The Department of Defense has committed to fully deploy zero trust by the end of 2027. The demands for OEMs to address security are rapidly evolving. Secure by Design is a principle that prioritizes security early in design rather than leaving it as an afterthought. Industrial sectors like oil and gas, energy, municipal water, and wastewater departments use thousands of devices across a network. These assets have multiple contracts and multiple vendors. A disgruntled employee or third-party vendor has the potential of seeing everything and doing serious damage with traditional security. Yet, a minute of downtime can cost millions.  Take North America’s largest steel producer, $30 billion Nucor, as an example. Its data breach in May 2025 due to “unauthorized third-party access” triggered shutdowns at multiple facilities. As IT/OT integration grows, the Nucor data breach underscores how cyberattacks are growing in sophistication right along with the attack surface, which includes IIoT devices, communications, gateways, sensors, robotics, industrial routers, PLCs, and wireless access points.  Security, it turns out, is everyone’s concern, especially forward-thinking OEMs of industrial-grade networking hardware and edge devices like cellular routers, gateways, and modems. Secure by Design products give OEMs differentiation in a crowded marketplace. FreeWave Offers OEMs Competitive Advantage FreeWave has committed more than 30 years to developing industrial wireless solutions. Today, its end-to-end IIoT solutions transform connectivity, security, edge intelligence, and data insights for remote industrial enterprises around the world.  OEMs with small, niche markets to mass-produced industrial-grade products successfully embed FreeWave solutions in agricultural products, automation technology and edge devices.  The FreeWave Zentry™ solution is a zero-trust based security solution. It cloaks protected networks, making them “invisible” utilizing a simple concept: never trust, always verify. This means the system doesn’t automatically trust anyone or anything trying to connect to it – even if they’re coming from inside the network. Instead, every access request attempting to access resources is verified whether from a user, device, or application, no matter where they are.  Here are seven reasons OEMs are addressing security early in the product development life cycle and how the Zentry solution impacts outcomes for both OEMs and their customers. Differentiation in a Commodity MarketThe Zentry solution allows OEMs to stand out by embedding advanced network security directly into their products, moving them beyond commodity hardware and giving them a unique selling proposition. This makes their offerings more relevant and valuable to customers, helping them pull away from competitors who only provide standard connectivity features. Simplified and Consolidated SecurityBy integrating the Zentry solution, OEMs offer consolidated network security as part of their product, eliminating the need for customers to manage separate VPNs, static IPs, port forwarding, and multiple vendors. This reduces complexity, points of failure, and administrative overhead for OEMs and their end customers. Increased Network SecurityThe Zentry solution provides a zero-trust overlay, making devices and networks “invisible” to unauthorized users. It encrypts communications, limits access strictly to what’s needed, and reduces the attack surface – key for critical infrastructure and remote assets. This is especially valuable as cyber threats and ransomware attacks increase across industries. Improved ROI and Lower Total Cost of OwnershipWith the Zentry solution, OEMs and their customers reduce costs by eliminating unnecessary hardware, software, and ongoing maintenance. The solution is aggressively priced, easy to deploy (setup in minutes), and intuitive to manage, making it accessible even for organizations with limited IT resources. Flexibility and Broad CompatibilityThe Zentry solution can be installed on any device with a Linux environment, including cellular gateways, inexpensive Linux boxes, laptops, tablets, and servers, making it broadly compatible with existing OEM hardware and easy to integrate into diverse product lines. Multi-Tenant Management and ScalabilityThe Zentry console is multi-tenant, allowing OEMs to manage security for their own products and for their customers, supporting SaaS and managed service models. This enables new revenue streams and value-added services. Future-Proofing and Market RelevanceAs security becomes a top priority for buyers, OEMs embedding the Zentry solution are better positioned for the future, offering solutions that address both current and emerging threats, and aligning with the industry’s shift toward integrated, secure, and

A Network is an Ecosystem: Rethinking Security for OEMs

In a recent conversation with Anthony Besett of GetWireless, a metaphor emerged: a network is not just a collection of devices, but an ecosystem. The line is as catchy as it is directional:  original equipment manufacturers (OEMs), a foundational contributor to global supply chains, have a growing responsibility for securing today’s interconnected environments early in design.  How did we get here? Well, we live in a connected world. According to IoT Analytics, which tracks and analyzes IoT connectivity, the number of connected IoT devices will grow 14% by end of 2025, reaching 39 billion in 2030 and more than 50 billion by 2035. That’s six devices for every single person on earth.  Another way to frame this: 73.2% of the world’s population accesses the internet. A parade of innovative technologies have arrived: artificial intelligence (AI) infrastructure, hyperscalers (developers scaling data center networks), quantum computing, and the data center surge. Deloitte ranks “cyber and/or physical security concerns” as number three on its list of data center infrastructure challenges, tapping OEMs on the shoulder to take note of technology’s evolving impact. Besett serves as Vice President OEM Embedded Solutions for GetWireless, a leading value-added distributor of cellular solutions like intelligent gateways, servers, asset trackers, modems, and other solutions for IoT applications. Besett predicts that OEMs focusing only on designing, making, and selling products may be shortsighted. IoT devices are increasing and networks are becoming more complex. The stakes for robust, holistic security have never been higher – and OEMs recognizing that their products are responsible for the entire network ecosystem will be the ones to differentiate their product.  Intentional security for OEMs is a bold leap forward for customers. Beyond Silos: A Network as a Secure Ecosystem Besett emphasized that traditional approaches to security often focus on isolated components, protecting a gateway here or running penetration testing (pen testing) there. He says, “We have to be paying attention to security across the entire infrastructure, not just one piece of it. Historically, you’ve seen there’s attention to one piece.” Many of GetWireless’s suppliers do pen testing, for example, but Besett sees that changing in the future with security-minded solutions that are guaranteed to protect networks and all the devices that go beyond that point. Here’s why: in an ecosystem, every element is interdependent. A vulnerability in one device – like a sensor, workstation, or camera – threatens the health of the entire network. Just as the rapid spread of Dutch Elm Disease endangers a forest, a single weak link in a network can compromise an entire digital environment. As an example, consider the Mars Hydro breach. The China-based maker of LED grow lights had 2.7 billion records exposed, including passwords, IP addresses, and device IDs, all because the attacker was in Wi-Fi range.  OEM manufacturers have an opportunity to help mitigate the risks of IoT data breaches. Besett shares, “I was in a conversation not too long ago where a customer’s whole network was hacked because somebody plugged into a gateway that wasn’t controlled. And so now you’ve got a hole. There are lawsuits. It’s going to be a mess.” He says fragmented security leaves the entire network ecosystem exposed.  The takeaway for cybersecurity: silo thinking is risky when it comes to individual OEM network products. A piecemeal approach is no longer sufficient. Zero Trust Security and Zentry Besett points out the value of zero-trust architectures, such as the FreeWave Zentry™ solution. Referencing back to his customer example, he explains, “There were vulnerabilities there that if something like Zentry was on that, that wouldn’t have happened because they (the attacker) would have actually had to request access.” “The devices on the edge, sensors, the workstations, the PCs, the tabs, the LPRs, all those different things, they get security as well. And it’s really cool because Zentry controls who has access, when they have access, and exactly what they have access to. What’s so unique about Zentry and their kind of ‘look’ on the infrastructure is . . . giving the control to an OEM to be able to secure everything for their customers, not just one piece.” Security must extend to every part of the network ecosystem, he says. It’s not enough to lock the front door; every window, back door, and fence line needs protection.  The FreeWave Zentry solution secures not just one component but the entire deployment by making the attack surface invisible – there are no public IP addresses, open ports, or static tunnels to scan or exploit. Ephemeral sessions mean access appears only when needed and disappears when complete, leaving no standing exposure. Deterministic control removes noise, helping small security teams focus on real threats without wasting time on no false positives. Besett explains, “Zentry controls who has access, when they have access, and exactly what they have access to.” This Identity-driven access ties every connection to a verified user, device, and policy for precise control. Devices, from license plate readers to medical wearables, become ubiquitous and integral to securing critical operations. At GetWireless, Besett says the company looks at the entire connected world, including body wearing devices, POS machines, monitoring cameras, and weather stations. “We’re engaged at all those different levels in the community,” he says.   Security, according to Besett, is no longer a “nice-to-have” but a fundamental requirement for any device that connects to a network. He notes, “Do you want to be the hole in the network that creates the problem for a customer or brings down a network?” The risks are real, from lawsuits to national infrastructure threats. Zero trust gives OEMs an opportunity to proactively address vulnerabilities at every layer, not just at the gateway or a single device, but across the entire ecosystem. What OEMs Need to Know About Zero Trust Security is poised to become a differentiator in the marketplace. With many devices becoming commoditized, Besett suggests that embedding zero trust could set OEM network products apart. Besett asks a good question: “Why would you choose a device that doesn’t meet

FreeWave Technologies Welcomes Cybersecurity and AI Industry Specialist to Lead Security Offerings

November 12, 2025 – Boulder, CO FreeWave Technologies, Boulder, CO is pleased to announce that Andrew Livingston has joined the team as Senior Solution Sales Engineer. This strategic hire underscores FreeWave’s commitment to expanding its market presence and delivering enhanced Industrial edge security solutions, like its FreeWave Zentry™ zero-trust based offering to customers worldwide. Andrew will leverage his advanced knowledge and expertise to help organizations increase their network security with Zentry while securing their infrastructure assets. His appointment comes at a pivotal time as industries increasingly recognize the critical importance of robust security measures for connected industrial systems. “We are thrilled to welcome Andrew to the FreeWave team,” said Michael Tate, COO and SVP of sales and marketing. “His unique combination of cybersecurity and artificial intelligence expertise along with his technical solution understanding positions him perfectly to help our customers navigate the complex security landscape. As industrial connectivity continues to expand globally, having leaders like Andrew on our team ensures we can deliver the sophisticated, secure solutions our customers demand.” Andrew brings more than a decade of deep experience in governance, risk, and compliance (GRC) and data security posture management (DSPM), with a proven track record in turning complex cybersecurity frameworks into measurable business outcomes. His educational background includes a Master of Science in Artificial Intelligence and a Master of Science in Project Management, providing him with both the technical depth and strategic perspective necessary to address today’s industrial security challenges. The FreeWave Zentry solution creates an invisible security layer that eliminates the attack surface. Embedded in the Elements™ ES1000 Zentry security provides just-in-time connections to only those access requests that are authorized. This reduces operational risks, cuts license costs and meets Zero Trust mandates (CISA/NIST) with a single solution. Together, they create a temporary, invisible, and secure link that vanishes once the task is complete, leaving no doors open. FreeWave Technologies continues to lead the industry in helping critical infrastructure automate and connect securely at the edge by providing critical data and connectivity solutions for industrial applications. Andrew’s addition to the team reinforces the company’s position as a trusted partner for organizations seeking to securely connect and monitor their critical infrastructure. About FreeWave Technologies FreeWave continues to transform industrial communication with more than 30 years of proven, proprietary radio technology deployed in the world’s most demanding environments. We deliver open-standards wireless networks, AI-powered edge applications, and an integrated cloud platform that’s secured by FreeWave Zentry zero trust architecture. From traditional telemetry to advanced edge AI and autonomous systems, FreeWave empowers you to secure the entire data lifecycle, from collection to monetization. Backed by a strong IP portfolio and global partnerships, we’re built for the future of industrial intelligence Contact: Sue MooreVP of MarketingFreeWave [email protected]

Ditch the Wires, Keep the Power: FreeWave ZU1100 – The Smart Wireline Replacement Solution

IIoT often lives in harsh environments where trenching equipment, excavators, and backhoes can be challenging and expensive to operate. Costs escalate based on trench length and depth, soil type, post-trenching land restoration, permitting costs, and regulatory requirements.  Then there are maintenance considerations once copper wire is in the ground. If wire breaks underground, how do you know where the problem is? In places like the American West or Canada, where wild fires exist, wires require flame-retardant, or self-extinguishing jackets. High-temperature environments, chemical exposure or flood zones also require extra maintenance for underground wire. Rising copper prices pose a rising theft risk too – a billion dollar industry annually according to Nasdaq – where criminals trade stolen copper for profit, putting critical infrastructure at risk. “Aging, trenched wired infrastructure is a high risk. You need to get in front of the problem because it’s not a matter of ‘if,’ it’s a matter of ‘when’ that wired infrastructure will fail,” said William H. Conley, III, director of technical and customer support at FreeWave.  That risk is highest for legacy industries like oil and gas, utilities, and water wastewater treatment. As digitalization increases, reliably transmitting analog and digital input/output (I/O) and sensor data across long distances becomes even more critical.  Traditionally, as an example, transmitting 4-20mA signals over long distances has required trenching miles of shielded twisted pair (STP) wire. In the past, trenching of wire signals has been a costly and maintenance-heavy process. Enter ZumEdge® ZU1100. FreeWave’s latest wire replacement solution is designed to make buried wire a thing of the past and industrial analog and digital I/O and sensor data flow. What Is ZU1100? Wire replacement solutions aren’t new. Many companies offer solutions that are deployed in a lot of networks, today. However, the ZU1100 IS different. It is a bi-directional I/O wireless solution that replaces labor-intensive wired connectivity for customers in industrial sectors. The best part is a hallmark of FreeWave’s design philosophy: install it and it just works. It’s pre-configured so you literally plug it in and it works. ZU1100 mirrors analog and digital signals from one point to another, eliminating the need for physical wiring. Whether you’re monitoring a remote water tank’s level or controlling a pump miles away, ZU1100 transmits real-time analog and digital I/O and sensor data, to include 4-20mA signals current loops over distances of up to 20 miles, or farther in some instances. The DIN-mountable device is sleek, measuring about the size of your favorite summer read. It supports two analog inputs/outputs and two digital inputs/outputs on each end, enabling two-way communication between field equipment and control systems. Being able to quickly analyze and respond to data variations is one of the paramount benefits from FreeWave solutions.  What’s better is that FreeWave is no stranger to radio technology. We’re trusted. Since 1993, FreeWave has led the way with more than 800,000 units in use around the world sending telemetry data to users. As data has evolved, thousands of customer conversations led to innovating the an evolved solution that truly scales. Unlike previous one-way solutions, the ZU1100’s bi-directional design allows for peer-to-peer and, soon, peer-to-multi-peer relationships (with its ability to support up to 32 remote devices in future updates). Future features include support for additional protocols and system integration for streamlined workflows.  “How industry collects information is identical across markets such as oil and gas, utilities, water/wastewater, and building automation,” said Conley. Add to the list industries like agriculture, smart cities, chemical processing, and manufacturing. When industry requires analog I/O signals, they prefer 4-20mA current loops. Why? Because the signal is almost immune to electrical noise and interference, delivering reliable signals.  “It’s the same analog and digital I/O signals, the same protocols like Modbus and MQTT (that many industries use). What might differ is the regulatory requirements and the type of command and control,” said Conley.  Even there, ZU1100 is prepared – for anything. Conley said that FreeWave designs solutions to the “absolute most challenging scenario.” ZU1100 is industrial grade: Class I, Division 2-certified (C1D2). It can operate in temperatures from -40°C to +75°C and is explosive proof – a must-have for oil and gas customers.  Along with ease of use, security is another signature design element in FreeWave solutions. AES encryption is available on ZU1100, with future plans for enhanced network security via FreeWave Zentry™, a secure connectivity solution introduced by FreeWave earlier this year based on zero-trust principles. Future integration of AI and advanced protocols are also on ZU1100’s ideation board. ZU1100 Use Cases Field technicians, administrators, integrators, and partners in industrial sectors wrestling with wired sensor systems have a number of use cases that highlight ZU1100’s plug-and-play installation, bi-directional I/O, and rugged, reliable performance. Here are three high-impact use cases: Industrial Monitoring  A remote water tank with sensors measures level, pressure, and pump current, all while feeding into a programmable logic controller (PLC). ZU1100 transmits signals wirelessly for remote monitoring and control.  Automated Control Devices are connected in real-time so operators send commands such as turning on a pump or shutting down a system based on sensor readings – without the need to trench and maintain long runs of physical wiring. This use case is ideal for industries where assets are distributed over large, hard-to-wire areas. ZU1100’s bi-directional monitoring and remote actuation increases operational efficiency and reliability. Protocol Bridging and Legacy System Modernization ZU1100 helps organizations transition from legacy systems using protocols like Modbus to modern IoT protocols such as MQTT. (According to a 2022 survey by HiveMQ, 50% of respondents use MQTT as a standard protocol.) ZU1100 can bridge analog/digital, I/O and serial/Ethernet protocols so data flows between old and new equipment, allowing gradual modernization, and supporting both legacy and next-generation protocols. What’s Next? At FreeWave, our vision is to make receiving and sending data easy. It’s a world where we see IIoT being scalable, smart, and simple.  ZU1100 is a next-generation, customer-driven solution that bridges the gap between legacy systems and future-ready industrial automation. The solution creates connected, intelligent, and

FreeWave Technologies Unveils Zentry™: Enhancing Secure Connectivity for Industrial IoT with Zero Trust Architecture

June 27, 2025 – Boulder, CO  FreeWave Technologies, a leader in industrial IoT connectivity, announces the launch of Zentry™, a robust zero trust security solution designed to strengthen edge asset connectivity. Available as an embedded feature within FreeWave’s Elements® ES1000 portfolio or as a standalone solution, Zentry delivers advanced cybersecurity for industrial and enterprise IoT networks, addressing rising threats like endpoint vulnerabilities, system disruptions, and data breaches. Built on the “never trust, always verify” principle, Zentry uses zero trust architecture to secure networks of any size or complexity. Unlike traditional perimeter-based defenses, Zentry authenticates every user and device at every connection point, reducing vulnerabilities and containing potential threats with precision. “Zentry shifts cybersecurity from reactive to proactive,” said Richard Reisbick, CTO of FreeWave Technologies. “Imagine a fortress where every entry requires real-time verification. If a threat emerges, it’s isolated instantly, unable to spread. Zentry assumes risks are ever-present and stops them effectively, enabling businesses to operate securely in today’s challenging digital landscape.” Key Features of Zentry Zentry provides practical, scalable, and user-friendly security tailored for industrial IoT environments: Never Trust, Always Verify: Every access request undergoes strict authentication, ensuring no user or device bypasses scrutiny, whether inside or outside the network. Least-Privilege Access: Permissions are dynamically assigned and monitored, granting only the minimum access needed to prevent unauthorized actions. Microsegmentation: Networks are divided into secure, isolated zones, containing breaches and minimizing their impact on critical operations.   Streamlined Management with Zentry Console The Zentry Console, integrated into the FreeWave Data Platform, offers clear visibility and control over Zentry-protected devices. Key capabilities include: Real-Time Device Management: Revoke credentials or adjust permissions instantly from anywhere. Custom Device Identification: Define devices with tailored naming conventions for improved clarity and control. Permission-Based Triggers: Automate and customize management actions to meet your organization’s specific needs.   Zentry integrates seamlessly with external Identity Providers (IdPs) and JWT systems, supporting “zero touch” deployments and compatibility with existing identity frameworks. By authenticating connections before they reach the network’s Policy Enforcement Point (PEP), Zentry neutralizes traditional attack vectors, ensuring strong protection for distributed assets. Addressing Critical Cybersecurity Needs Zentry arrives at a crucial time. Industrial control systems face increasing cyberattacks, with potential losses in millions per incident. The European Union’s Cyber Resilience Act (CRA) mandates strict cybersecurity for connected devices, while the U.S. Department of Defense targets full zero trust adoption by 2027 across 16 critical infrastructure sectors, including energy, utilities, and agriculture, all key markets for FreeWave. “Cyber threats are a daily reality,” Reisbick noted. “Zentry enables organizations to meet regulatory requirements, protect critical operations, and stay resilient in a connected world.” Strengthened by Strategic Partnerships In collaboration with NetFoundry and Keyfactor, FreeWave has tailored Zentry to deliver edge-optimized security for remote networks with distributed assets. This partnership ensures Zentry is a scalable, reliable solution for industries like energy, agriculture, and defense, where secure connectivity is essential. Why Choose Freewave Zentry for your Remote Networks? Robust Security: Protect your IoT ecosystem with a zero trust framework that adapts to modern threats. Seamless Integration: Leverage existing infrastructure for quick deployment and minimal disruption. Scalable for Any Network: From small operations to global enterprises, Zentry delivers tailored security without complexity. Regulatory Compliance: Meet requirements with confidence. About FreeWave TechnologiesWith more than 30 years of expertise, FreeWave Technologies is a global leader in industrial IoT solutions, delivering reliable, secure connectivity for mission-critical applications. From energy to agriculture to defense, FreeWave enables industries to succeed in the digital era with advanced technology and deep expertise. Contact: Sue MooreVP of MarketingFreeWave [email protected]

FreeWave Launches Elements® ES1000 with FreeWave Zentry™ Powered by Zero Trust: Solving Secure Remote Networks

June 27, 2025 – Boulder, CO – FreeWave Technologies, Inc. is changing the dynamic of remote network security with the launch of its Elements ES1000 networking device powered by the FreeWave Zentry, zero trust framework. This combination eliminates the vulnerabilities of static IP addresses, delivering unparalleled security and seamless connectivity for critical infrastructure operations.  Designed to protect and secure remote assets, the ES1000 with Zentry sets a new standard for IIoT network security, addressing the evolving needs of field crews, IT/OT managers, and C-suite leaders. A single breach can lead to compromised data or devastating and expensive downtime, risking regulatory penalties and damage. Traditional solutions like firewalls or VPNs fail to fully mitigate these risks, as static IPs remain discoverable and exploitable, especially in distributed ecosystems with aging equipment. FreeWave’s solution makes networks essentially invisible to the world while also simplifying how companies setup remote connections. The ES1000 is a rugged networking device and cellular gateway with an embedded zero trust framework that strengthens your network’s security. By enforcing continuous authentication, microsegmentation, and end-to-end encryption, it ensures that every network connection, whether to a pump, valve, robot, sensor, or PLC, is verified and isolated, eliminating the need for static IPs altogether. Data never touches the public internet, and granular access controls prevent lateral movement. This approach aligns with stringent standards like NIST 800-207, IEC 62443, and NERC CIP, ensuring compliance without complexity. Key Features and Benefits of the new FreeWave solution Simplified Management: FreeWave Zentry Console on the FreeWave Data Portal provides a single-pane-of-glass for real-time management, visibility and control of connected devices further optimizing operations. The ability to define devices with custom naming conventions takes IP or device ID differentiation one step further. Embedded Zero Trust Security: Continuous verification and micro-segmentation lock down every endpoint, eliminating static IP exposure and reducing breach risks. Optimized for the Edge: FreeWave designed this combined solution to work in remote locations with heavy intelligent edge-compute requirements. Unlike other solutions, the ES1000 with Zentry provides robust, rugged and reliable connectivity in the harshest environments. Global Connectivity: A single global SIM with automatic carrier switching ensures reliable, cost-effective, low-latency connections for fixed and mobile assets, from rural oil fields to urban grids. Rugged Reliability: Built for harsh environments (-20°C to 70°C), the ES1000 delivers reliability and edge-computer power with quad-core A53 hardware for compute-intensive applications.   The ES1000 with Zentry has already proven its value in real-world applications. An operations director at a leading energy firm shared that they, “put the device through the rigors in several different environments and various applications and, it just works.”  Steve Wulchin, CEO of FreeWave Technologies, emphasized the strategic impact: “In an era where cyber threats target static IPs and disrupt critical operations, the ES1000 and Zentry deliver a fortress-like solution that empowers industries to scale securely and efficiently. This is more than a product, it’s a commitment to protecting our customers’ critical infrastructure and assets from the field or the boardroom.” FreeWave Technologies has set a new benchmark in IIoT security and connectivity with the launch of the Elements ES1000 device. By eliminating the long-standing vulnerabilities of static IP addresses, this innovative solution delivers robust, end-to-end protection and seamless global connectivity for industries reliant on remote operations. About FreeWave Technologies Headquartered in Boulder, Colorado, FreeWave Technologies has been a pioneer in industrial wireless solutions for over 30 years. Committed to delivering reliable, secure, and innovative connectivity, FreeWave empowers industries to optimize operations and drive efficiency through advanced IoT solutions. Contact: Sue MooreVP of MarketingFreeWave [email protected] FreeWave Elements® ES1000 Copyright FreeWave Technologies. Use prohibited without permission.

Are Static IPs a Liability in the Industrial Space? Or Are You As Protected as You Think?

Actor John Krasinski plays Jim Halpert in The Office. Jim’s one-liners pave his pursuit of a fulfilling sales career at Dunder Mifflin, a paper company. (Example: I am about to do something very bold in this job that I’ve never done before: try.) Spoiler alert: Krasinski becomes one of the company’s top salespeople. That’s what human beings do. We evolve. So does technology. Today, industrial internet of things (IIoT) data demands devices that are dynamic because, like Krasinski’s character, networks are continuously evolving. The goal? Make your network and devices resilient. In this blog, we’ll explore the number one problem for cellular network industrial users, what you should know about static and dynamic IP (Internet Protocol) addresses, how they impact network security, and a true story of how we hacked into a customer’s network – during a meeting with them.  ——————————————————————————–—- What are Static and Dynamic IP Addresses? Why Should You Care? Let’s start with the basics. An IP address is a string of numbers identifying each device connected to a network. The Internet Service Provider (ISP) assigns the unique device “name” allowing it to: Be recognized by the network (hey, I see you) Communicate with other devices (let’s talk) Historically, industrial devices use static IP addresses. From web servers to sensors to VPNs, these addresses are fixed. They never change. It’s kind of like living at the same house address all your life – when people know where you live, they can send you whatever mail they want, whenever they want.  In contrast, dynamic IP addresses get assigned a unique address by the Dynamic Host Configuration Protocol (DHCP) server. Every time a router reboots or the system changes or said device is not in use, the device’s IP address changes. In this case, imagine living in Paris one day and Milan the next. With no one knowing your address, you are free from receiving junk mail forever. In the Age of Connectivity – where devices, data, and business scenarios are constantly in flux – are static IPs a liability for industrial users?  Why do Industrial Companies Use Static IP Addresses? In short: dependable network access. Businesses need consistent destinations for sending data and a stable address to connect to. Dynamic IP addresses, which shift over time, complicate this process. For a clearer picture, think of how tricky your search for information would be if Google’s website address kept changing. While consistency has been the reasoning behind static IP addresses, technology has evolved – and so has cyberattacks. The vulnerability of static IP addresses now outpaces their original usefulness. Unidirectional vs. Bidirectional Integration Most cellular devices are designed with unidirectional integration where information travels one way. For industrial users, this means data from the edge travels to the world. Many cellular devices are not factory-equipped with a bidirectional, or two-way, data path.  A garage door sensor with unidirectional data, for instance, only gets you so far. If you put your bike away, but forgot to close the garage door, an alert notifies you. It’s now Sunday morning so you’re home and can close it as you get your morning coffee going. It doesn’t work, though, if you’re on a flight to Turks and Caicos (although an open garage door probably wouldn’t ruin your vaca).  A better way would be an app where you click a button and close the door, and it’s confirmed on your phone. This way, you have a secure home no matter where you are.  The same scenario holds true for industrial use cases. Bidirectional data allows you to turn devices – like pumps, drives and machinery – on and off to prevent failures and save time driving to remote places.  What is the cost of an oil spill for an hour or productivity loss because machinery is down or, most importantly, equipment failure that triggers unsafe conditions? Devices with bidirectional integration lead to greater data accuracy and data accessibility across the enterprise. In a connected world, data democratization gives people insight to make smarter decisions and be more productive.  For example, when a project manager and a safety engineer access the same real-time data, rather than work in data silos, system integration creates more efficient workflows. Shared data, connected “things,” and different platforms work together. Cellular devices with a bidirectional data path help integrate a project management platform with safety data. Imagine watching an HMI (human-machine interface) screen to monitor a pump’s pressure, temperature, flow rate and vibration. The screen flashes red, indicating high pressure and overheating. You’re able to hit the off button, eliminating a potential explosion. Every second counted and with bidirectional data, you averted disaster. Think of it this way: unidirectional data brings “problems” to you with no simple button to fix them. Stressful. Bidirectional data brings “problems” to you and the ability to solve those problems. Peaceful. One solution, however, begets more issues. At each end of the connection, there is an IP address or, put another way, a fresh opportunity to hack your network.  Top Concern: Security Breaches Have you ever had a conversation involving IoT where security wasn’t part of the discussion? The answer, most likely, is no.  With the continued rise of IoT devices on the network, the news platform Sci-Tech Today estimates that around 33% of attacks on IoT devices may impact critical operations, followed by 32% lack of skilled personnel to implement IoT security. Dynamic IPs can create greater network resilience because they simplify network administration and they typically experience fewer errors.  Two words: be prepared. In our view, security is the biggest concern associated with IP addresses. Static IP addresses are easily trackable (after all, they always stay the same). Hackers can more easily compromise them and move horizontally across the network to target other digital assets. This is one reason why security is more than an IT problem, it’s a leadership concern. Find out why network security matters to C-suite executives. Read the blog. After more than 30 years working with remote industries, we believe in security-first design

FreeWave Technologies Unveils ZumEdge® ZU1100: The Ultimate Wire Replacement Solution for Industrial IoT

Boulder, CO – April 29, 2025 – FreeWave Technologies, a leader in industrial wireless solutions, proudly announces the launch of the ZumEdge ZU1100, a bi-directional wire replacement solution designed for efficiencies in industrial IoT deployments. Engineered for unmatched reliability, the ZumEdge ZU1100 eliminates the constraints of traditional wired I/O systems, delivering cost-effective, scalable, and efficient automation for industries worldwide. The ZumEdge ZU1100 leverages a powerful 900 MHz wireless platform to provide real-time, bi-directional data transfer without the need for cumbersome wired infrastructure. With true plug-and-play functionality, this innovative solution is pre-configured for rapid deployment, minimizing setup time and operational complexity. Whether monitoring remote assets or optimizing automation, the ZumEdge ZU1100 ensures industrial-grade performance across critical applications, including oil and gas, water management, utilities, SCADA, and municipal operations. Key Features of the ZumEdge ZU1100 Effortless Wire Replacement: Seamlessly replaces wired I/O with high-precision analog and digital signal transfer, ideal for environments where wiring is impractical. Bi-Directional I/O: Supports analog (4-20 mA) and digital inputs/outputs for comprehensive monitoring and control. Long-Range Connectivity: Operates at 902-928 MHz with a fixed 1W output, achieving up to 60 miles of clear line-of-sight communication. Rugged and Reliable: Built for harsh environments with an operating temperature range of -40°C to +75°C and Class 1, Division 2 safety certification. Cost Savings and Scalability: Eliminates expensive wiring and maintenance costs while offering flexible network expansion to meet evolving operational needs. Remote Management: Enables real-time monitoring and control from anywhere, enhancing productivity and operational efficiency. Built for Industrial Demands The ZumEdge ZU1100 is designed to meet the rigorous demands of modern industrial applications. From multi-well pad sites and underground storage in oil and gas to lift stations and groundwater monitoring in water management, this solution delivers secure, reliable wireless performance. Its compact design and low power consumption make it a versatile choice for diverse industries. “Traditional wired I/O systems are costly and limit scalability,” said Michael Tate, COO and SVP of Sales and Marketing. “With the ZumEdge ZU1100, we’re empowering industries to ditch the wires and embrace a smarter, more connected future. This solution combines cutting-edge wireless technology with edge computing to deliver unparalleled flexibility and efficiency.” FreeWave ZumEdge ZU1100 Wire Replacement   About FreeWave Technologies Headquartered in Boulder, Colorado, FreeWave Technologies has been a pioneer in industrial wireless solutions for over 30 years. Committed to delivering reliable, secure, and innovative connectivity, FreeWave empowers industries to optimize operations and drive efficiency through advanced IoT solutions. Contact: Sue MooreVP of MarketingFreeWave [email protected]

Is Less More? How One SIM from FreeWave Streamlines IIoT Data for Global Hybrid Networks 

Listen to the blog SIMs and Asset Management SIM (Subscriber Identity Module) cards debuted in the 1990s, the era of Beanie Babies and grunge. Along with changing styles and tastes (thankfully), SIM cards have evolved.  Modern SIMs have a smaller footprint (from credit card to paperclip size) and larger capacity at a time when industrial internet of things devices (IIoT) are steeply rising. Also, the embedded SIM (eSIM) option is the “easy button,” delivering full-on network connectivity plus scalability for original equipment manufacturers (OEMs).  SIM cards allow data to travel over the internet to and from connected remote assets in the field: sensors, regulators, battery-operated solar systems, water tanks, as examples. The goal? Uninterrupted, secure cellular and satellite connectivity in remote environments. Yes, the humble SIM is the linchpin for keeping data in play. When it comes to asset management, these little chip cards carry a heavy load. Is managing multiple carriers across hundreds or thousands of SIMs, however, becoming a house of cards for global industrial operators? Could using a single SIM instead of many save money and time? How does that impact the demands of global hybrid networks? Will one SIM perform in near-impossible conditions? Could a single SIM make smart products smarter for OEMs? In this blog, we’ll share what we’ve discovered in global IIoT deployments that close the connectivity gap using satellite, cellular, and Wi-Fi so real-time data stays in play. Legacy LTE Connectivity Model for IoT is Yesterday’s Story A quick look back reveals how we got here. For the past two decades, high speed data transfer used Long Term Evolution (LTE) for 2G, 3G, and 4G. LTE started with a single provider in a one-to-one relationship model.  Then came virtual private networks (VPNs), gateways and devices all connecting to enterprise on-prem. Tier one mobile network operators (MNOs) took a page from gerrymandering politics, quickly marking their wireless cellular territory. North America is a great example. You go to AT&T® for the regions not covered by Verizon® or vice versa. Suddenly, you have another vendor to manage. And another. And another. Now, overlay that around the world. Dizzying, we know. As those one-to-one relationships with carriers multiplied, operational expenses and costs go up. FreeWave’s VIoT-Flex Consolidates Multiple Carriers with One SIM  It’s your day off. Time to pay personal bills. A steaming mug of coffee and laptop await your attention. Wouldn’t it be nice to hit one button and call it a day?  That’s the benefit of one SIM. It’s simple. Instead of managing dozens of carrier invoices, searching your email for payment reminders, and paying each one individually, a single SIM gives you one invoice with one data rate to manage.  How do you get this little chip in your hands? We thought you’d never ask. Enter VIoT-Flex, now available from FreeWave. We are the Master Reseller for Velocity IoT, a global mobile virtual network operator (unlike MNOs, MVNOs leverage the services of individual carriers, offering these services with one SIM, one invoice, one data rate plan – and one accountable partner to work with).   Along with Velocity IoT, we’re making IoT more accessible and scalable to a variety of remote industrial operators. VIoT-flex delivers seamless cellular coverage with no coverage gaps for OT networks. Over-the-air updates keep connectivity solutions up-to-date. Here’s why solving the multi-SIM problem was so important for us.  We look at the data journey holistically. We saw customers in remote parts of the world struggle with keeping track of multiple SIMs, especially as they added remote devices. (There’s no turning back – IIoT is expanding! IoT analytics predicts the number of connected IoT devices globally to reach 18.8 billion by the end of 2024, up from 16.6 billion at the end of 2023.)  They wrestled with tracking of multiple invoices, multiple carriers – and multiple IMSIs (each mobile network operator has an International Mobile Subscriber Identity number). Carriers like AT&T and Verizon in North America, Rogers® in Canada, Telefónica® in Mexico each have their own IMSI numbers. When you turn on the cell modem, the IMSI looks at the modem to see what tower it can connect to. In the simple sense, the IMSI is programmed into the SIM card. With one SIM, if the modem can’t connect to the first carrier, it simply goes to the next one. Our single SIM seamlessly switches between cellular carriers and supports satellite NTN (non-terrestrial networks), ensuring reliable coverage in remote locations. Want to learn more about VIoT-Flex? Get details here. VIoT-Flex is like managing one SKU in your product stack. With VIoT-Flex, customers now have access to a vast global carrier library bridging local core mobile networks.  With a three-in-one form factor, VIoT-Flex comes in 2FF normal, 3FF micro, and 4FF nano as well as embedded SIMS (eSIMs), which we’ll address in a moment. VIoT-Flex SIMs are made to withstand extreme temperatures, from a blustery -20 °C to a super hot +85 °C. VIoT-Flex eSIMs operate in -40 °C to a super hot +105 °C. Now, imagine one SIM with multiple IMSIs to SIMplify (we had to do it!) your life: One cellular invoice across many One data rate plan across many Only pay for data transmitted Global reach: 600+ carriers in 190+ countries Low latency with 2G, 3G, 4G, LTE-M and NB-IoT  No roaming fees, complex zoning tariffs, sub-optimal data pools, fixed contracts or time-consuming debugging Only FreeWave’s VIoT-Flex gives you access to an enterprise data platform so you can manage and program SIMs and data plans from one location. There’s the short story of how multiple IMSIs become one – giving users one invoice, one SIM for global cellular coverage. Breathing deeper?  eSIMs Reduces Costs and Make OEM Products Smarter – even in Frigid Nebraska Winters Embedded SIM cards are called eSIMs. They are soldered right onto a device’s radio board for seamless wireless connectivity over a cellular network. OEM manufacturers use this because it protects the SIM from cracking or shrinking if it’s too cold or expanding and

FreeWave Technologies, NetFoundry, and Keyfactor Announce a Triumvirate for IIoT Connectivity Security Services

Boulder, CO – January 28, 2025 – FreeWave Technologies, a leader in industrial wireless connectivity and Industrial Internet of Things (IIoT) solutions, has integrated the technology of NetFoundry and Keyfactor to deliver unparalleled security and simplicity for IIoT connectivity. This triumvirate leverages Zero Trust principles and architecture from the field’s foremost leaders, setting a new standard for network security in remote and embedded industrial edge operations.  FreeWave Technologies has implemented this stringent security methodology into its IIoT network portfolio. “Based on the criticality of secure connectivity in today’s hyper-connected world,  we looked for a team that could push us beyond what’s common with VPN and APN security practices today. Leveraging Zero Trust principles and techniques will help our customers move away from once-trusted VPNs to something that is impermeable to threats. FreeWave’s Zero Trust overlay applies the strictest security practices on every user, device, and application in our customers’ networks. Our deny-by-default model ensures no bytes or access requests are allowed, until explicitly authenticated and authorized with strong identity,” said Steve Wulchin, CEO of FreeWave Technologies. FreeWave Technologies: Leading the Charge in IIoT Connectivity FreeWave Technologies’ innovation has consistently been at the forefront of industrial connectivity, providing robust and reliable IIoT solutions tailored to the unique challenges of remote operations for three decades. Our key features include: Enhanced Connectivity: Leveraging global satellite and cellular networks, along with our proprietary radio communications, FreeWave ensures seamless communication in even the most rugged and remote locations. Real-Time Data Visualization: Users benefit from real-time data visualizations, alerts, and alarms, crucial for optimizing operations, understanding usage patterns,  and addressing issues promptly via our Platform-as-a-Service data platform solution. NetFoundry: Zero Trust Secure Connectivity Designed into your Products NetFoundry, a pioneer in Zero Trust security, is driving a paradigm shift worldwide that enables product builders like FreeWave to embed secure overlay connectivity directly into their industrial-grade products and applications. Key features and benefits include: Secure By Design Solution Offers: Connected products become unreachable from underlay networks, utilizing their own, embedded, global zero trust connectivity. Simplified and Scalable Operations: Increased adoption of products and services by eliminating inefficient dependencies on customer’s infrastructure, identifiable IP addresses, vulnerable VPNs, and complex firewall configurations. Business Velocity and Acceleration:  NetFoundry’s OEM Partners quickly deliver new connected product offers to the world’s most security conscious customers, exceeding EU CRA, NIST 800-171, and IEC 62443 standards without long development cycles. “FreeWave has designed NetFoundry’s industry-leading, embedded Zero Trust  connectivity into their powerful IIoT solutions, making adoption super simple and secure for their customers. The integrated solution means FreeWave customers do not need to waste time and money to build their own secure networking infrastructure, nor do they need to disrupt existing firewalls and network routing configurations. We are proud to partner with FreeWave to help them serve IIoT customers with excellence”, said Galeal Zino, CEO of NetFoundry. Keyfactor: Ensuring Trust with Comprehensive Digital Identity Security Keyfactor, the leader in digital identity security, specializes in protecting the integrity and authenticity of data and devices with: Public Key Infrastructure (PKI): Keyfactor provides comprehensive PKI solutions to manage and secure digital identities across IIoT devices, ensuring data integrity and trust. Certificate Lifecycle Automation: Automates the management of digital certificates, reducing the risk of expired certificates and potential security vulnerabilities. IoT Device Security: Ensures that every IIoT device is authenticated and authorized, preventing unauthorized devices from accessing critical networks. “With the rise of IIoT, ensuring the security and integrity of every device and data point is crucial. Our collaboration with FreeWave and NetFoundry brings together the best in connectivity, network security, and digital identity management to safeguard industrial operations,” said Ellen Boehm, SVP, IoT Strategies and Operations at Keyfactor. A Synergistic Solution for Unmatched IIoT Security FreeWave’s implementation of this security technique marks a significant milestone in advancing IIoT security standards for remote IIoT networks. By combining FreeWave’s expertise in industrial connectivity, NetFoundry’s Zero Trust networking, and Keyfactor’s digital identity management, customers can rely on a comprehensive security solution that addresses the most pressing challenges faced by remote industrial operations. Key Benefits of the Triumvirate: Enhanced Security: Authenticate-before-connect and no inbound FW ports means no network requests or bytes of data can be sent, minimizing the potential risks of network attacks, hacks, and device insecurities. Seamless Integration: Clients benefit from a unified IIoT solution that integrates robust connectivity, advanced network security, and digital identity management. Operational Efficiency: Real-time data insights and secure connectivity enable clients to optimize their operations and reduce downtime. Scalability and Flexibility: The combined solutions ensure that clients can scale their operations efficiently, adapting to evolving industry demands. Visit the FreeWave Technologies’ website to learn more about the latest IIoT network developments and how this collaboration is setting new standards in the industry. ### Press Contacts FreeWave TechnologiesSue [email protected] NetFoundryMichael [email protected] KeyfactorMarketBridge for [email protected]